OAuth 2.0 Flow Explained
Step through the OAuth 2.0 authorization code flow to see how apps get access tokens without touching passwords. Then watch a code interception attack succeed without PKCE, and see how PKCE blocks it.
No sign-up required. Each demo is a taste of the interactive simulator experience. Our full deep dives contain dozens more like these.
See how Runtime Visuals turns abstract concepts into visual, hands-on learning experiences.
Step through the OAuth 2.0 authorization code flow to see how apps get access tokens without touching passwords. Then watch a code interception attack succeed without PKCE, and see how PKCE blocks it.
See exactly how SQL injection works and why parameterized queries stop it. Watch a login query get built, parsed, and executed across three scenarios: normal input, an injection attack, and the prepared statement fix.
See how Docker builds images from layers, launches containers with copy-on-write, and uses Linux namespaces and cgroups to isolate processes. Compare the build, runtime, and isolation perspectives.
Watch the TLS 1.3 handshake unfold step by step: Client Hello, key exchange, certificate verification, and encrypted data. Then see what an attacker sees without TLS, and how the certificate chain of trust proves server identity.
Step through 5 classic sorting algorithms and watch them execute in real-time. See comparisons, swaps, and understand why some algorithms outperform others in different scenarios.
Our full platform includes dozens of interactive labs covering runtime systems, security, networking, architecture, and much more.